The easiest way to store data and to achieve
portability of data, pen drive is widely used. Different forms of data can be
stored in the pen drive i.e., whether the data is in the form of document or in
the form of images anything can be stored. The data stored in it can be
confidential and there may be chances that the owner of pen drive doesn’t what
to share it with anybody else.

Moreover pen drives are very small in size. There
are chances that they are lost easily or can also be stolen easily. We need to
make the data secure and provide some authentication in the pen drive so that
even when the pen drive is lost/stolen the access to pen drive is prohibited.
The main focus of this project is to secure the data present in the pen drive.

KEYWORDS

Log Files, Encryption, RSA, AES, RF ID, GPS

INTRODUCTION

Data
(audio, video, text, etc.) can be transferred to and from computer quickly with
the help of Pen drives. Data can easily be read and written by the user on the
Pen Drive by plugging it into the USB port on the computer. Due to the compact
and portable nature of the pen drives they are widely used and they also don’t
require any external power supply. Floppy disks and CD’s are replaced by pen
drives due to several benefits provided by the latter. Fast access and transfer
of data in addition with larger data storage is provided by pen drives.

Storage
capacity of the Pen Drive can vary from few megabytes to over 100 GB. Nowadays
even external hard drives are available in the market with huge storage
capacity, which like Pen Drive can be connected to a USB port on the computer. It is an external storage device
which can easily be lost. Sometimes the data stored in Pen drive is
confidential and important so if it is lost it can lead to several
consequences. So our aim is to secure the data so even if somebody gets hold of
the pen drive they are unable to misuse it. After securing the data it’s
necessary to get our pen drive back. To do so we need to track the location of
the Pen drive.

LITERATURE
SURVEY

DATA SECURITY

When compared
to fixed Winmax, mobile networks have high security architecture9,12, because
it is wireless and also very secured as it implements various protocols.
Protocols like, Privacy and key management protocol version 2, X.509
certificate, Security Associations etc and also different encryption methods.
Other ECC techniques with mobile networks can be also used so as to ensure
strong authentication. This along with RSA techniques ensure secure
authentication.

There
are two Cryptographic techniques mostly used, Secret-Key Cryptography and
public key cryptography13,5. Secret-Key Cryptography, also known as single-key
or private-key or symmetric key or one-key
encryption technique. It uses one and same key for both encryption and
decryption side. If we use this technique, its cost is very less but has many
drawbacks like, shared secret key requirement, distribution of same key on both
sides, authentication and non-repudiation.

In
public-key cryptography which is also referred to as public key encryption,
makes use of two different key on both encryption side and decryption side,
i.e. public key and private key respectively. Here, the public key is available
to all and is used in encrypting the messages. Whereas the private key is more
like a hidden key or a secret key, and is used to decrypt the message. RSA
algorithm uses multiple keys to perform encryption and decryption and hence it
helps in a very secure transmission of data and message. RSA algorithm works better
if the key value is large, because it will be difficult to find the factor of
n.

As
mentioned above, large key size helps better authentication. But it also
consumes space and wont be easy and user friendly. So to overcome this problem
a hybrid cryptographic technique 18,15 has been prepared. It includes, RSA,
DES and SHA1 algorithms. This is done majorly to enhance the encryption process
and provide more security in key generation. This also helps in reducing key
size considerably and improving the key complexity. This encryption technique
is used in the JAVA environment. And the performance of hybrid encryption is
assessed on the basis of encryption and decryption time and space complexity.

Different
studies has shown that AES algorithm6 works faster as compared to other
encrypting and decrypting algorithms.
The encryption time of AES is very less compared to the encryption time
take by RSA. AES is more secured than RSA or DES or Tipple DES. AES is more
better, secure and faster algorithm to work with.

Cloud
data encryption techniques 2,3 is based on file matching technique. It makes
indexes of the stored file and supports a secure environment for user search.
Further the file matching the keyword in the various searches and ranked based
on the relevant frequency and file length. This also helps in solving the
problems of multi-keyword search on cloud data, and sets of different privacy
requirements. Among different multi-keyword semantics, by choosing the
principle of coordinate matching to effectively represent similarity between
query keywords and outsourced documents, and using inner product similarity,
the principle of similarity measurement. Studying some further enhancements of
the ranked search mechanism, supports more search semantics, i.e., TF _ IDF,
and dynamic data operations. Access control for the different users has been
achieved and the integrity check of data which is been outsourced to the cloud
has examined efficiently. It provides virtualized security to the data. It
majorly concentrates on data indexing and extracting.

HARDWARE TRACKING

Barcode
Scanning 8,16,17 helps in locating the pen drive. This can be implemented
with the help of a circuit which will be on the pen drive. The circuit is
implemented on Matlab Simulink as it gives an accurate result. And there is a
GPS (in our phones) used with the barcode so that it becomes easy to track the
pen drive. It is an added functionality that provides better result.

The
circuit attached to the pen drive contains a set of micro chip and micro
controller for data transmission and a
separate data logger to store pen drive information, i.e. its longitudinal
latitude information. Hence making its
easy to track the pen drive. The only drawback to the arrangement is that the
pen drive should be properly charged. The circuit should have enough charge to
transfer information to mobile gps

Fig 1. Block Diagram

The figure1 is explained as;

ATmega644: We use ATmega644
to transfer data between hardware components present in the

circuit.

Max
2472: We
use Max2472 to
trace the location and to find
out the latitude and longitude position of the device.

Data
logger: We
use Data logger for storing all the data
that is collected in the form of co-ordinates. The data will be sent to a data
logger and it will save that data.

Rechargeable
unit: To supply power to the circuit,
we use a rechargeable unit. This rechargeable unit supplies the power to the
circuit. It will charge the USB device, when it will be connected to the
system.

RF
ID 1,4,14 can also be used for device tracking. It is a small chip which
sends the location of the device within a specified range. The drawback with RF
ID is that, its perimeter range for device location is very small, i.e. 30-40
meters.

GPS vehicle
tracking System 7,10,11. This system makes use of the latitude and longitude
of the location of a vehicle which is to be tracked. Google maps are being
used. The user makes the request for tracking the vehicle and the device
responds via SMS. The SMS contains of the latitude and longitude information
about the vehicle and thus using it we can locate the vehicle on google maps.
In addition to tracking, we can also perform various functions remotely on the
vehicle, like switching ON ignition system, switching it off too, locking the
doors of the vehicle and remotely unlocking the doors. Firstly, a signal is
sent by the user to the tracking system. As soon as the signal is received, the
system tracks the vehicle and a SMS is sent to the user that contains the exact
location.

COMPARISON BETWEEN
VARIOUS ENCRYPTION ALGORITHMS

Few
encryption algorithms are being compared on based of attributes like: key size,
execution time, security level, block size etc.

Table 1: Encryption algorithm comparison

Input Key Size

Execution Time(ms)

Security Level

Block Size

Asymmentric

Cryptographic
Algorithm

49

6.456

Medium Level

64

Diffie-Hellman Key Exachage

RSA ALGORITHM

36

3.976

High Security

64

RSAAsymmetric Algorithm

BLOW FISH

54

5.998

High Security

128

SHA-224

DES ALGORITHM

123

6.159

Medium Level

64

SHA-386

3DES ALGORITHM

256

0.699

Very High Security

64

SHA-256

Proposed Method

FEASIBILITY STUDY

ECONOMIC
FEASIBILITY

The extra cost
apart from buying the pen drive is that of the GPS (micro GPS) which costs
nearly about 600 rupees. Though it is more than the cost of pen drive but we
can compromise few bucks for it as it provides us the facility to locate our
lost pen drive. If our pen drive is lost then definitely we will buy a new one.
So despite of buying a new pen drive we can spend some money to buy a pen drive
with inbuilt GPS system.

TECHNICAL
FEASIBILITY

In order to
encrypt the data present in the pen drive we are going to use RSA
encryption-decryption algorithm. It occupies space of nearly about 0.5-0.6 GB
in the pen drive which is approximately negligible.

PRACTICAL
FEASIBILITY

In order to make
the pen drive to be used by everyone different security measures are provided.

If the pen drive
is going to be used by corporate then in that case they can make use of the
.EXE & LOG file security measure. But if pen drive is going to be used by
some common people like students etc. then they can follow the
username-password security followed by encryption-decryption algorithm which
makes the pen drive feasible.

CONCLUSION

Hence after
referring various papers it can be concluded that, in the proposed project, the
pen drive can be devised with a MINI GPS
for easy TRACKING of the pen drive. And
for DATA SECURITY in pen drive, it
can be done in two ways:

1.
If
the data is vulnerable and cannot be compromised at any cost, then .EXE FILE & LOG FILE approach is
used. That is, the system will have the exe files installed, and the pen drive
will be having the IP address of the system saved in the log file. If the IP
address is matched then only the system can access the data in the pen drive,
or else a mail is sent to the owner and the drivers of the pen drive are
blocked.

2.
If
the USB is to be used among a group of people, then USERNAME-PASSWORD authentication will be provided. Then the data
will be encrypted and decrypted
using a KEY. If the key is entered
wrong more than the specified number of times, then again information regarding
unauthorized access is sent to the owner and the USB drivers are blocked.

According
to the survey, it is found that the AES
Encryption Technique is the most suitable technique to encrypt data.